Guest posts Archive

In this guest blog, Leron Zinatullin, author of The Psychology of Information Security – Resolving conflicts between security compliance and human behaviour, explores how to build a security culture. A security department may sometimes be referred to by executives …

Alan Field, author of ISO 37001 – An Introduction to Anti-Bribery Management Systems and the ISO 37001:2016 ABMS Documentation Toolkit, explores the implications of seasonal gift giving. Sigmund Freud is credited with saying “Sometimes a cigar is just a …

Written by guest author Ken Lynch NIST background NIST (the National Institute of Standards and Technology) is a body responsible for creating a series of regulatory documents commonly referred to as SPs (Special Publications). For instance, NIST SP 800 is …

Eva Hanscom from Venafi explores the growing problem of machine identity threats. There are many ways that compromised machine identities can be used in cyber attacks: Attackers can misuse machine identities to establish hidden or concealed encrypted communication tunnels on …

Eva Hanscom, Venafi In her first post for the IT Governance Publishing blog, Venafi’s Eva Hanscom explains the importance of protecting machine identities. IT governance programmes formally align cyber security initiatives with business goals. It’s imperative that every member of …